Thursday, October 24, 2013

Online Seller beware of Fraudsters

Buyers at online auctions and classified sites aren't the only ones who stand to lose money if they get caught in a scam. During National Cyber Security Awareness Month, advocates are issuing a warning to sellers as well.

Did you know that the online classified sales site Craigslist receives more than 100 million new posts every month? Billions of dollars in merchandise are bought and sold through the Web site every year. Similarly eye-opening: eBay reports over 112 million active users who have bought or sold an item in the last year. With so many transactions being processed and money changing hands, many scammers see Craigslist, eBay, and other online marketplaces as the perfect place to take advantage of consumers. In typical online buying scams, the buyer is at risk of “purchasing” fake or non-existing products. However, scams targeting the sellers of goods should be a concern to consumers as well. Seller, beware!

October is National Cyber Security Awareness Month. All month NCL, in partnership with the National Cyber Security Alliance, theDepartment of Homeland Security, and many other organizations is encouraging consumers to adopt safer online habits. Fraudsters often target people through email, tricking consumers into divulging personal information that leads to a scam. NCL’s Fraud.org receives hundreds of complaints every month from people who have been scammed online. Two consumers who fell victim to the fake buyer scam shared their stories with us recently.

This summer, a woman we’ll call “Mary” from New Jersey listed her Blackberry z10 smartphone on eBay for $425. She was elated when the auction closed and the phone sold for $485, well above her asking price. Upon receiving an email from “PayPal” saying the buyer had paid, Mary was ready to ship the phone. The buyer requested that Mary send the phone to Africa for the buyer’s son’s birthday, which she did. Days passed by and then weeks. Mary desperately tried to contact the buyer but was unable to reach her and later found out that the “PayPal” email was a forgery.

Read more......

Tuesday, October 22, 2013

Security for Browser

Browser hijacking is a type of online fraud. Scammers use malicious software (malware) to take control of your computer's Internet browser and change how and what it displays when you're surfing the web. If you are already a victim of a hijacked browser, the following instructions can help you free your browser from the hackers, restore browser settings, and boost browser security.

Help free your browser from hackers
Antivirus and antispyware software helps prevent and detect malware. If any malware does manage to bypass your firewall, antivirus and antispyware software will help remove that potentially dangerous software. If you have Windows 8 installed, antivirus software is included with the operating system. You are not required to do anything to set it up. If you are using earlier versions of Windows, Microsoft provides free antivirus software called Microsoft Security Essentials. Many of our partners also offer antivirus software.

Help restore your browser home page
If your home page keeps changing back to another page, this might be a sign that your computer is infected with a virus. After you have updated your computer with the latest antivirus software, restore your browser home page.
To change your home page in Internet Explorer 10
  • Internet Explorer 10 is the latest and most secure version of the Microsoft web browser.
  • Download Internet Explorer 10 to help protect your computer against viruses, fraud, ID theft, and other threats.
  • In Internet Explorer, navigate to the page that you want to make your home page.
  • Click the down arrow next to the Home icon on the Internet Explorer toolbar, and then click Add or change home page.
  • Click either Use this webpage as your only home page or Add this webpage to your home page tabs.
Help boost browser security by disabling add-ons
Many browser hijackings come from add-on software, also known as browser extensions, browser helper objects, or toolbars. These items can improve your experience on a website by providing multimedia or interactive content, such as animations. However, some add-on software can cause your computer to stop responding or display content that you don't want, such as pop-up ads. Internet Explorer 10 and Internet Explorer 9 warn you in the notification area of your browser if an add-on is slowing down your computer. You can also view the add-ons that you already have installed and disable the add-ons that you don't want by clicking the gear icon, and then clicking Manage add-ons.

Security with HTTP

Secured HTTP
Let us discuss about what is HTTP? It is protocol to transmit the user request to remote server to open a website or web pages on internet. Its abbreviation is “Hyper Text Transfer Protocol” (HTTP) commonly used in internet browsers to open a website in the browser window. Actually when you type a website name in the browser, the HTTP protocol transfer your website name to the remote server eventually to open the web pages on your computer screen. HTTP protocol request send to the remote server through port 80 and your web address is preceded by http://websitename.

How Secure is HTTP?
Speaking In technical terms now a days HTTP protocol is not secured especially when you are making financial transactions your data can be stolen while it is transmitted to a web server. So we can conclude that sites that are using HTTP protocol are vulnerable for data theft. So, we need a alternative for HTTP to transmit the data in secured way.

You are Secure with HTTPS
HTTPSecure means HTTPS basically combination of HTTP and SSL (Secure Sockets Layer) protocol allows the user to establish a secured encrypted connection between user and the website hosted remote server. HTTPS is commonly used by websites with sensitive transactions like online payments or banking transactions or personal data. Example FACEBOOK and TWITTER social networking sites are using HTTPS protocol to keep secure their user data. When you type the name of the website https://websitename appear automatically.

HTTP use port 80
HTTPS use port 443

Warning: Don’t do any online payments or money transactions with websites without HTTPS. First check the website whether it is giving encrypted security or not, then only you proceed for transactions.